{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:29Z","timestamp":1750308689961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319729","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"245-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Distance bounding under different assumptions"],"prefix":"10.1145","author":[{"given":"David","family":"Gerault","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Ioana","family":"Boureanu","sequence":"additional","affiliation":[{"name":"University of Surrey, UK"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aysajan Abidin Eduard Marin Dave Singel\u00e3l'e and Bart Preneel. 2016. Towards Quantum Distance Bounding Protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10155 (11 2016). Aysajan Abidin Eduard Marin Dave Singel\u00e3l'e and Bart Preneel. 2016. Towards Quantum Distance Bounding Protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10155 (11 2016)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ahmad Ahmadi and Reihaneh Safavi-Naini. 2018. Directional Distance-Bounding Identification. In Information Systems Security and Privacy Paolo Mori Steven Furnell and Olivier Camp (Eds.). Springer International Publishing Cham 197--221. Ahmad Ahmadi and Reihaneh Safavi-Naini. 2018. Directional Distance-Bounding Identification. In Information Systems Security and Privacy Paolo Mori Steven Furnell and Olivier Camp (Eds.). Springer International Publishing Cham 197--221.","DOI":"10.1007\/978-3-319-93354-2_10"},{"volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems (2 ed.)","year":"2008","author":"Anderson Ross J.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264628"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053000"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.47"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140518"},{"volume-title":"Distance-bounding Protocols. In Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT '93)","year":"1994","author":"Brands Stefan","key":"e_1_3_2_1_10_1"},{"volume-title":"Foundations and Practice of Security, Joaquin Garcia-Alfaro","author":"Brelurut Agn\u00e8s","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022277"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277320"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_9"},{"key":"e_1_3_2_1_16_1","unstructured":"B. Danev. 2018. METHOD DEVICE AND SYSTEM FOR SECURE DISTANCE MEASUREMENT. (2018). US patent 20180367994. B. Danev. 2018. METHOD DEVICE AND SYSTEM FOR SECURE DISTANCE MEASUREMENT. (2018). US patent 20180367994."},{"key":"e_1_3_2_1_17_1","unstructured":"Alexandre Debant St\u00e9phanie Delaune and Cyrille Wiedling. 2018. Proving physical proximity using symbolic models. Research Report. Univ Rennes CNRS IRISA France. https:\/\/hal.archives-ouvertes.fr\/hal-01708336 Alexandre Debant St\u00e9phanie Delaune and Cyrille Wiedling. 2018. Proving physical proximity using symbolic models. Research Report. Univ Rennes CNRS IRISA France. https:\/\/hal.archives-ouvertes.fr\/hal-01708336"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"volume-title":"Information Security, Xuejia Lai, Jianying Zhou, and Hui Li (Eds.)","series-title":"Lecture Notes in Computer Science","author":"D\u00fcrholz Ulrich","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"EMVCo. 2018. Book C-2 Kernel 2 Specification v2.7. EMV Contactless Specifications for Payment System. www.emvco.com\/wp-content\/plugins\/pmpro-customizations\/oy-getfile.php?u=\/wp-content\/uploads\/documents\/C-7_Kernel_7_V_2_7_Final.pdf. (Feb 2018). EMVCo. 2018. Book C-2 Kernel 2 Specification v2.7. EMV Contactless Specifications for Payment System. www.emvco.com\/wp-content\/plugins\/pmpro-customizations\/oy-getfile.php?u=\/wp-content\/uploads\/documents\/C-7_Kernel_7_V_2_7_Final.pdf. (Feb 2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_26"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2012.6404574"},{"volume-title":"Information Security and Cryptology - 10th International Conference, Inscrypt","year":"2014","author":"Boureanu I.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Mathilde Igier and Serge Vaudenay. 2016. Distance Bounding Based on PUF. In Cryptology and Network Security Sara Foresti and Giuseppe Persiano (Eds.). Springer International Publishing Cham 701--710. Mathilde Igier and Serge Vaudenay. 2016. Distance Bounding Based on PUF. In Cryptology and Network Security Sara Foresti and Giuseppe Persiano (Eds.). Springer International Publishing Cham 701--710.","DOI":"10.1007\/978-3-319-48965-0_48"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Handan Kilinc. 2018. Implications of Position in Cryptography. (2018) 209. Handan Kilinc. 2018. Implications of Position in Cryptography. (2018) 209.","DOI":"10.12968\/S1467-5560(22)60379-8"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Handan Kilin\u00e7 and Serge Vaudenay. 2015. Optimal Proximity Proofs Revisited. In Applied Cryptography and Network Security Tal Malkin Vladimir Kolesnikov Allison Bishop Lewko and Michalis Polychronakis (Eds.). Springer International Publishing Cham 478--494. Handan Kilin\u00e7 and Serge Vaudenay. 2015. Optimal Proximity Proofs Revisited. In Applied Cryptography and Network Security Tal Malkin Vladimir Kolesnikov Allison Bishop Lewko and Michalis Polychronakis (Eds.). Springer International Publishing Cham 478--494.","DOI":"10.1007\/978-3-319-28166-7_23"},{"volume-title":"2015 International Conference and Workshops on Networked Systems (NetSys). 1--8.","author":"Kleber S.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"S. Mauw Z. Smith J. Toro-Pozo and R. Trujillo-Rasua. 2018. Distance-Bounding Protocols: Verification without Time and Location. In S&P 2018. Springer. S. Mauw Z. Smith J. Toro-Pozo and R. Trujillo-Rasua. 2018. Distance-Bounding Protocols: Verification without Time and Location. In S&P 2018. Springer.","DOI":"10.1109\/SP.2018.00001"},{"key":"e_1_3_2_1_30_1","unstructured":"Stephen Mayhew. 2018. Korean credit card companies developing biometrics-based offline payments system. https:\/\/www.biometricupdate.com\/201806\/korean-credit-card-companies-developing-biometrics-based-offline-payments-system. (2018). Stephen Mayhew. 2018. Korean credit card companies developing biometrics-based offline payments system. https:\/\/www.biometricupdate.com\/201806\/korean-credit-card-companies-developing-biometrics-based-offline-payments-system. (2018)."},{"volume-title":"Secure localization and time synchronization for wireless sensor and ad hoc networks","author":"Meadows Catherine","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0280-4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.27"},{"key":"e_1_3_2_1_34_1","unstructured":"Claude E Shannon. Communication theory of secrecy systems. (????). Claude E Shannon. Communication theory of secrecy systems. (????)."},{"key":"e_1_3_2_1_35_1","first-page":"1240","article-title":"UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks","volume":"2017","author":"Singh Mridula","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_36_1","volume-title":"FC 2015, San Juan, Puerto Rico, January 26--30","volume":"8975","author":"Chothia T.","year":"2015"},{"key":"e_1_3_2_1_37_1","unstructured":"Peter Thueringer Hans De Jong Bruce Murray Heike Neumann Paul Hubmer and Susanne Stern. 2008. Decoupling of measuring the response time of a transponder and its authentication. (November 2008). Peter Thueringer Hans De Jong Bruce Murray Heike Neumann Paul Hubmer and Susanne Stern. 2008. Decoupling of measuring the response time of a transponder and its authentication. (November 2008)."},{"volume-title":"Making Contactless EMV Payments Robust Against Rogue Readers Colluding With Relay Attackers. In the 23rd International Conference on Financial Cryptography and Data Security (Financial Crypto","year":"2019","author":"Tom Chothia Liqun Chen","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41227-1_1"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319729"}},"subtitle":["opinion"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":37,"alternative-id":["10.1145\/3317549.3319729","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319729","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}